vulnerability

Amazon Linux 2023: CVE-2025-12495: Important priority package update for openexr

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Dec 23, 2025
Added
Jan 26, 2026
Modified
Jan 26, 2026

Description

Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27946.
A flaw was found in OpenEXR, a library for handling High Dynamic Range (HDR) image files. This heap-based buffer overflow vulnerability allows a remote attacker to execute arbitrary code on a user's system. This occurs when a user is tricked into opening a specially crafted EXR file, exploiting a weakness in how the software processes image data. Successful exploitation could lead to complete control over the affected system.

Solutions

amazon-linux-2023-upgrade-openexramazon-linux-2023-upgrade-openexr-debuginfoamazon-linux-2023-upgrade-openexr-debugsourceamazon-linux-2023-upgrade-openexr-develamazon-linux-2023-upgrade-openexr-libsamazon-linux-2023-upgrade-openexr-libs-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.